Wibu-Systems' Patents

Share:

Patents are the representation of genius expressed through unique innovations. As such, patents are a primary asset of any successful enterprise. When filed internationally, they support a stable market positioning. Customers identify themselves more easily with companies that invest in research and development and share their singular treasures with their loyal base.

This is exactly the story of Wibu-Systems, a company that strongly believes in its highly qualified staff. Over the years the bright minds of Wibu-Systems’ founders and employees have collaborated to create major components of present and future technology. These intellectual property milestones have been protected through patents valid in numerous countries.

In particular, Wibu-Systems holds the following patents:

Method for authorizing newly connected devices when connecting to a computer via an interface

A method for protecting a computer system against the transmission of unauthorized data from a device connected to an interface, in particular a USB device, of a computer system, where the computer system comprises of a screen and an interface. The system has an operating system installed as well as preferably a specific driver, which is suitable for the connected device. The method consists first of recognizing a device via the interface and optionally classifying the device. The data sent by the device is received, and any unauthorized data is detected. In a further step, a test form is displayed on the screen, which is preferably associated with an input request. In the next step, an authorization test is executed, in particular a Turing test, the received data is evaluated, and it is verified whether the test was successful. If the test is passed, the device is authorized, and the data transmitted by the device is passed on to the computer system. If the test is not successful, the device is blocked, and no further data is transmitted. More

Method and computer system for protecting a computer program against influence

Method for protecting a computer program against the influence of an intrusive program or manipulation software used to manipulate computer programs on a computer system with a processor unit, main memory, and a storage medium. The method relies on Kerckhoffs’ principle. Parts of the computer program are encrypted to prevent its static analysis without execution of the program by the processor. A key required for decrypting the encrypted parts of the computer program is stored in a secure container that communicates with the computer. More

Method comprises encoding of the software by a license provider using license parameters, recording of software, encoded license parameter transfer from provider to license taker and automatic encoding of the software using the license parameters while the software is being used by the license taker. More

Method for controlling data processing device

The invention relates to a method for controlling a data processing device that is connected to a computer via an interface. Said method comprises the following steps: a device-specific command is generated on the computer by means of an application program; the command is stored in a special file and is then transmitted by the computer to the device with the aid of the write instruction of the computer's operating system; the special file is received by the device; the device-specific command is read out from the special file; the device processor finally executes the command. More

Authorization code recovering method

The invention relates to a method for recovering an authorization code which is assigned to a licensee by a licensor and is stored in an access-protected data processing device that is connected to a computer of said licensee via an interface. A backup file which is part of the authorization code and contains the license parameters is stored on the licensee's computer. More

Method for intrusion detection

Method for protecting computer software by detecting an attack of an intruding program interfering with the execution of said protected software on a computer system with a processor and at least a processor memory, wherein the computer software to be protected communicates with a license container containing a license for using and executing the protected computer software and containing at least one cryptographic key, wherein the license container provides licenses and cryptographic keys for the protected software to protect its usage and its integrity, and wherein the protected computer software is at least partly encrypted and uses the associated cryptographic keys to decrypt said protected software for executing comprises the following steps. More

Method for protecting an application program against reverse engineering and related computer program product

Method for protecting an application program executable on a computer against reverse engineering, said application is created to run with at least one selected dynamic link library (DLL) on said computer, comprises the steps of: removing the references from the application to the used dynamic link library to be run with; adding a specific library loader to the executable application program, said loader either contains or has access to said dynamic link library; setting modified references to said dynamic link library in the correct places of the application; and, upon loading said application program and said loader into the main memory of said computer, initializing said dynamic link library by said library loader; thereby linking said library to the application program like a static link library. More

Method for generating a cryptographic key for a secure digital data object on the basis of the current components of a computer

Method for generating a cryptographic key on the basis of current components of a computer for decryption of an encrypted, computer-specific authorization code for activating a protected digital data object e.g. executable file such as executable program, application, application program and programs in machine language or in script languages, non-executable files such as programs in source code, text file, database file, audio file, image file and video file and general binary files used by proprietary programs for storing data, on the computer. More